java language NetBeans
Write a program that prompts the user to enter the weight of a person in kilograms and outputs the equivalent weight in pounds. Output both the weights rounded to two decimal places. (Note that 1 kilogram = 2.2 pounds.) Format your output with two decimal places.
In: Computer Science
(Seconda/a) Why is business and IT alignment important for an Enterprise? Discuss your answers with an example. PLEASE write your answer in your own words!thanks
In: Computer Science
my_list = {} Dictionary holding all the lists. s_files = [] # Files with size UNDER 50 KB. m_files = [] # Files with size AT LEAST 50 KB and UNDER 5 MB . l_files = [] # Files with size AT LEAST 5 MB, no upper limit. directories = [] # Directories, regardless of size. Write a program using python that loops over each file in a specified directory and checks the size of each file.Create 2-tuple with the filename and size, should append the 2-tuple to a list, and then store all the lists in a dictionary according to the size
In: Computer Science
Write a class called Name. A tester program is provided in Codecheck, but there is no starting code for the Name class.
The constructor takes a String parameter representing a person's full name. A name can have multiple words, separated by single spaces. The only non-letter characters in a name will be spaces or -, but not ending with either of them.
The class has the following methods. • public String getName() Gets the name string.
• public int consonants() Gets the number of consonants in the name. A consonant is any character that is not a vowel, the space or -. For this problem assume the vowels are aeiou. Ignore case. "a" and "A" are both vowels. "b" and "B" are both consonants. You can have only one if statement in the method and the if condition cannot have either && or ||. Do not use the switch statement, which is basically the same as an if statement with multiple alternatives. Hint: call method contains().
• public String initials() Gets the initials of the name. Do not use nested loops for the method. Hint for initials(): Each word after the first is preceded by a space. You can use the String method indexOf (" ", fromIndex) to control a while loop and to determine where a new word starts. This version of indexOf() returns the index of the first space starting at the fromIndex. The call of indexOf (" ", fromIndex) returns -1 if the space is not found in the string. Remember that the name does not have 2 consecutive spaces and does not end in a space.
CODE CHECK:
public class NameTester { public static void main(String[] args) { Name name = new Name("Allison Chung"); System.out.println(name.getName()); System.out.println("Expected: Allison Chung"); System.out.println(name.consonants()); System.out.println("Expected: 8"); name = new Name("a-abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ"); System.out.println(name.getName()); System.out.println("Expected: a-abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ"); System.out.println(name.consonants()); System.out.println("Expected: 42"); name = new Name("Alhambra Cohen"); System.out.println(name.initials()); System.out.println("Expected: AC"); name = new Name("George H W Bush"); System.out.println(name.initials()); System.out.println("Expected: GHWB"); name = new Name("John Jacob Jingleheimer Schmidt"); System.out.println(name.initials()); System.out.println("Expected: JJJS"); name = new Name("Zorro"); System.out.println(name.initials()); System.out.println("Expected: Z"); } }
In: Computer Science
Deceitful emails are illusory measures that are taken up by attackers for personal gain in order to lure in innocent people. They are used to scam and defraud people. The emails usually involve offers that are too good to be true, and they are targeted towards naïve individuals. If you as a Cybersecurity expert are facing a phishing email scenario in your organisation Trident, how will you educate employees within your organisation. Illustrate and justify the use of machine learning to catch email fraud and spam to top management besides ensuring digital literacy in your organisation. Cite your sources. [4 marks + 1 mark for Referencing Style = 5 marks]
In: Computer Science
Use your webcam and record a movie, write a motion detection code and print the message "Motion Detected" on the original frame. Try to make a better visualization by using different masking.
---using Numpy and opencv
In: Computer Science
(Seconda/b) A successful Enterprise Architect must have skills
in all of the following areas. Provide an example of how a
successful Enterprise Architect can demonstrate his or her skills
in each of the below areas.
• Business Strategy
• Financial Management
• Organizational Dynamics
• Business Process Design
• Information Technology
PLEASE write your answer in your own words!thanks
In: Computer Science
DUE IN TWO HOURS
ASAP PLEASE!!!
Given the following specification, design a class diagram using PlantUML. To design the class diagram, use abstract (10 points), static (10 points), package (20 points ), namespace (20 points ), association (20 points ), and generalization (20 points ) on PlantUML
Specification:
Submit a DOC/PDF file including PlantUML script and diagram.
In: Computer Science
Founded in April 1996, Antheus Tecnologia develops and distributes Automated Fingerprint Identification Systems (AFIS), automated fingerprinting, and other systems such as iris recognition devices. Antheus Tecnologia also claims that it is the first Brazilian company to be certified by the US Federal Bureau of Investigation (FBI) and develops biometric solutions for domestic and overseas clients.
In March 2020, the security research team at SafetyDetectives discovered a significant data leak in addition to other security flaws (such as lack of password protection) relating to fingerprint data on an Antheus log server in Brazil. The research team discovered almost 2.3 million data points in total and estimated that 76,000 unique fingerprints were found on the database. Approximately 16 gigabytes of data were found on the Elasticsearch server including highly sensitive information related to identification and biometric details.
The Antheus server investigated by the security team is an identity server, which means it gives users access to the system or the ability to register as a new user. It also had fingerprint information in at least two “indices” from a total of 91. The Antheus server stored server and API access logs but also contained fingerprint data comprising of Ridge Bifurcation and Ridge ending – essential components for identifying and verifying fingerprints. In addition to fingerprint information, there were also instances of biometric data vulnerabilities, such as face recognition data being accessible and retrievable from the database.
In parallel to the biometric data breach, Antheus Tecnologia also had another related vulnerability which was noticed during the investigation. The company provides services to a national Civil Identification System in Brazil used to issue driving licenses although the access portal used for on-boarding new users was also not secure because of the lack of password protection. Furthermore, user data, administrator login information, several employee email addresses and phone numbers were also found.
According to the SafetyDetectives research team, the practice of allowing access to server data in such a way is rather unusual. This methodology generally leaves the server, but this could have been done purposefully. If so, it’s a rather strange option to take when it comes to ensuring security. SafetyDetectives security team found two indices, potentially referring to two different companies using the Antheus server to store personal information including fingerprint data. Moreover, the investigation team found data logs relating to precise fingerprint scans that could be reconstructed from the index numbers stored on the Antheus server. Moreover, it could be possible to recreate (or reverse-engineer) a biometric image map for a particular fingerprint from strings of data found on the server. According to the research finding of the SafetyDetectives security team, nefarious users can access the Antheus server and after extracting the available data, could use the data stream of ones and zeros to recreate the full biometric image of someone’s fingerprint.
a) After analysing the case study, discuss the importance of biometric credentials, and report the impact of the data breach associated with biometric data.
b) Identify and discuss the vulnerability associated with fingerprint data stored on the Antheus Tecnologia server. Recommend a possible solution to patch this vulnerability.
In: Computer Science
1. Suppose that a software developer is creating a program to store lists of supermarket products. Each product has a code made up of the digits 0 and 1, for example 010011010000, and an availability, either yes or no. Further suppose that the software developer decides to store the lists in base-10, believing that base-10 will simplify calculations. Briefly explain why this is a bad idea.
In: Computer Science
Recommend appropriate data analytic techniques for security prevention at IMC. [5 marks]
In: Computer Science
Java program
In the main(), create and load a 2-dimentional array to hold the following sales data
Number of Tacos Sold (hard code the data into the array when you create it)
Truck3 Truck4 . Truck5
Monday 250 334 229
Wednesday 390 145 298
Friday . 434 285 . 156
• Write a method to calculate the grand total of all Tacos sold
Write a method to allow the user to enter a truck number and get the total sales for that truck
Write a method to allow the user to enter a Day and get the total sales for that day.
Invoke all of the methods from the main
Validate all entries the user makes
Comment your code
write the grand total to a .txt file
In: Computer Science
You are hired as a penetration testing engineer at Ivy Medical
Centre (IMC) located in Dandenong, Australia. The centre provides
medical services mostly to pensioners, and KMC is determined to
provide the highest security and privacy for their patients and
visitors.
On your arrival, you have learnt that IMC provides anonymous FTP
access to their database to external members. In addition, you have
learnt that many hospital staff members are not adequately trained
in cybersecurity and often fall for victim to phishing or other
attacks. You realise you must consider a more preventative security
solution for the protection of hospital data. As the hospital staff
members are not well trained, zero day attack seems a major
issue.
In: Computer Science
(terza/a) Define a set of rules that will be used while applying Zachman framework in capturing information about a company. PLEASE write your asnwer in your own words
In: Computer Science
Using C++ code, write a program named q3.cpp to compute the total amount of medicine m absorbed by a rabbit, where the rabbit gets 2 pills containing n1 and n2 grams of medicine, respectively, of which the rabbit absorbs 60% and 35%, respectively, and n1 and n2 are input by a user via the keyboard.
In: Computer Science